Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9D4EA18-4E49-4BEA-B450-60769AE53E84", "versionEndExcluding": "1.27.0", "versionStartIncluding": "1.10.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1:*:*:*:*:*:*", "matchCriteriaId": "D147AF4C-74C3-41AE-B5A5-24051AC1458B", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc1:*:*:*:*:*:*", "matchCriteriaId": "8F5DBC6B-2239-4349-A836-EFB8BA720145", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc2:*:*:*:*:*:*", "matchCriteriaId": "B366BC5E-6845-40C3-9A2E-89BF99BC0C84", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc3:*:*:*:*:*:*", "matchCriteriaId": "96565E7C-0CE5-439C-9B81-551DC0B7CB9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc4:*:*:*:*:*:*", "matchCriteriaId": "7547CA64-3DEC-4322-96CA-C732E132DC3B", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc5:*:*:*:*:*:*", "matchCriteriaId": "8067F8FC-2183-4302-A7EE-29912E68F1A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone1-rc6:*:*:*:*:*:*", "matchCriteriaId": "B1C2A606-5B3A-47C7-A94A-9BBA6E4B330F", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2:*:*:*:*:*:*", "matchCriteriaId": "200043CB-5676-4005-97B8-C95BCFF3EE0B", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc1:*:*:*:*:*:*", "matchCriteriaId": "73A9B62D-47A5-41B3-8E7C-86DED14A230D", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc2:*:*:*:*:*:*", "matchCriteriaId": "923C9C51-206A-4C12-A60D-3E9DE7808BCD", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc3:*:*:*:*:*:*", "matchCriteriaId": "98CF1F86-BE1E-410E-A425-873081B9B353", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone2-rc4:*:*:*:*:*:*", "matchCriteriaId": "34AD9B07-0C66-487A-9D32-A75C99852EE0", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone3:*:*:*:*:*:*", "matchCriteriaId": "1DE8050C-59BA-4789-B211-7AC0D0E696BE", "vulnerable": true}, {"criteria": "cpe:2.3:a:apache:nifi:2.0.0:milestone3-rc1:*:*:*:*:*:*", "matchCriteriaId": "665BBA63-AF45-4B9F-BA0E-6C900E675270", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the authenticated user. Upgrading to Apache NiFi 1.27.0 or 2.0.0-M4 is the recommended mitigation."}, {"lang": "es", "value": "Apache NiFi 1.10.0 a 1.26.0 y 2.0.0-M1 a 2.0.0-M3 admiten un campo de descripci\u00f3n en la configuraci\u00f3n del contexto de par\u00e1metros que es vulnerable a Cross site Scripting. Un usuario autenticado, autorizado para configurar un contexto de par\u00e1metro, puede ingresar c\u00f3digo JavaScript arbitrario, que el navegador del cliente ejecutar\u00e1 dentro del contexto de sesi\u00f3n del usuario autenticado. La mitigaci\u00f3n recomendada es actualizar a Apache NiFi 1.27.0 o 2.0.0-M4."}], "id": "CVE-2024-37389", "lastModified": "2024-11-21T09:23:46.127", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "security@apache.org", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-07-08T08:15:10.847", "references": [{"source": "security@apache.org", "tags": ["Mailing List"], "url": "https://lists.apache.org/thread/yso9fr0wtff53nk046h1o83hdyb1lrxh"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2024/07/08/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List"], "url": "https://lists.apache.org/thread/yso9fr0wtff53nk046h1o83hdyb1lrxh"}], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "security@apache.org", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}